4.7 Article

Security analysis and defense strategy of distributed filtering under false data injection attacks

Journal

AUTOMATICA
Volume 138, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.automatica.2021.110151

Keywords

Distributed estimation; False data injection attacks; Security analysis; Protection strategy

Funding

  1. National Natural Science Foundation of China [62122026, 61973123, 61873106, 62121004]
  2. Natural Science Foundation of Jiangsu Province for Distinguished Young Scholars, China [BK20200049]
  3. NSW Cyber Security Network in Australia [P00025091]
  4. Programme of Introducing Talents of Discipline to Universities (the 111 Project), China [B17017]
  5. Shuguang Program by Shanghai Education Development Foundation, China
  6. Shanghai Municipal Education Commission, China
  7. Fundamental Research Funds for the Central Universities, China

Ask authors/readers for more resources

This paper investigates the distributed state estimation for multi-sensor networks under false data injection attacks. It first considers the chi(2) detector for detecting the authenticity of transmitted data and derives a necessary and sufficient condition for the insecurity of the distributed estimation system. It then proposes an algorithm for generating false data and a new protection strategy to ensure the security of the distributed estimator.
This paper investigates the distributed state estimation for multi-sensor networks under false data injection attacks. The well-known chi(2) detector is first considered for detecting the authenticity of the transmitted data. A necessary and sufficient condition for the insecurity of the distributed estimation system is derived under which the hostile attacks can bypass the false data detector and degrade the estimation performance. Moreover, an algorithm for generating false data is provided to keep the attack stealthy. In order to overcome the detection vulnerability, a new protection strategy is proposed to ensure that the distributed estimator is secure under false data injection attacks. It is worth emphasizing that the strategy adopts a stochastic rule instead of a fixed threshold to detect suspicious data, which effectively avoids the occurrence of the truncated Gaussian distribution. A simulation example of moving vehicle is presented to demonstrate the effectiveness of the developed approaches. (C)& nbsp;2022 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available